Patents by Inventor Marcus Oestreicher
Marcus Oestreicher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10527710Abstract: A software-defined radio system has a plurality of fixed radio receivers each operable to receive radio signals in a receiving band, to sample a received radio signal to produce a sample stream, and to send the sample stream over a network. The radio system includes at least one fixed sync signal transmitter operable to transmit predetermined sync signals in said receiving band to receivers of the aforementioned plurality. The radio system further comprises a data processing system which is connected to the network for receiving sample streams from the receivers. The data processing system is operable to align samples of a data signal contained in sample streams from different receivers by: detecting a sync signal in those sample streams; determining a timing offset between samples of the sync signal in those sample streams in dependence on predetermined locations of the different receivers and the transmitter of that sync signal; and aligning the samples of the data signal in dependence on the timing offset.Type: GrantFiled: August 24, 2018Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Anton Beitler, Alexandru Caracas, Thomas Eirich, Michael Kuyper, Marcus Oestreicher
-
Publication number: 20190011524Abstract: A software-defined radio system has a plurality of fixed radio receivers each operable to receive radio signals in a receiving band, to sample a received radio signal to produce a sample stream, and to send the sample stream over a network. The radio system includes at least one fixed sync signal transmitter operable to transmit predetermined sync signals in said receiving band to receivers of the aforementioned plurality. The radio system further comprises a data processing system which is connected to the network for receiving sample streams from the receivers. The data processing system is operable to align samples of a data signal contained in sample streams from different receivers by: detecting a sync signal in those sample streams; determining a timing offset between samples of the sync signal in those sample streams in dependence on predetermined locations of the different receivers and the transmitter of that sync signal; and aligning the samples of the data signal in dependence on the timing offset.Type: ApplicationFiled: August 24, 2018Publication date: January 10, 2019Inventors: Anton Beitler, Alexandru Caracas, Thomas Eirich, Michael Kuyper, Marcus Oestreicher
-
Patent number: 10067219Abstract: A software-defined radio system has a plurality of fixed radio receivers each operable to receive radio signals in a receiving band, to sample a received radio signal to produce a sample stream, and to send the sample stream over a network. The radio system includes at least one fixed sync signal transmitter operable to transmit predetermined sync signals in said receiving band to receivers of the aforementioned plurality. The radio system further comprises a data processing system which is connected to the network for receiving sample streams from the receivers. The data processing system is operable to align samples of a data signal contained in sample streams from different receivers by: detecting a sync signal in those sample streams; determining a timing offset between samples of the sync signal in those sample streams in dependence on predetermined locations of the different receivers and the transmitter of that sync signal; and aligning the samples of the data signal in dependence on the timing offset.Type: GrantFiled: March 21, 2016Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Anton Beitler, Alexandru Caracas, Thomas Eirich, Michael Kuyper, Marcus Oestreicher
-
Publication number: 20170273054Abstract: A software-defined radio system has a plurality of fixed radio receivers each operable to receive radio signals in a receiving band, to sample a received radio signal to produce a sample stream, and to send the sample stream over a network. The radio system includes at least one fixed sync signal transmitter operable to transmit predetermined sync signals in said receiving band to receivers of the aforementioned plurality. The radio system further comprises a data processing system which is connected to the network for receiving sample streams from the receivers. The data processing system is operable to align samples of a data signal contained in sample streams from different receivers by: detecting a sync signal in those sample streams; determining a timing offset between samples of the sync signal in those sample streams in dependence on predetermined locations of the different receivers and the transmitter of that sync signal; and aligning the samples of the data signal in dependence on the timing offset.Type: ApplicationFiled: March 21, 2016Publication date: September 21, 2017Inventors: Anton Beitler, Alexandru Caracas, Thomas Eirich, Michael Kuyper, Marcus Oestreicher
-
Patent number: 8302173Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: GrantFiled: May 22, 2008Date of Patent: October 30, 2012Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas D. Weigold
-
Patent number: 7543159Abstract: Provides a data processing system comprising a processor and encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. The second persistent memory stores a cryptographic key for decrypting the encrypted information, generating therefrom unencrypted information that is usable by the processor for executing an operation. The cryptographic key may be used for encrypting the unencrypted information, generating the encrypted information. Also provided is a method of processing such a data-processing system with an operating system, comprising writing unencrypted information into the first persistent memory, encrypting the unencrypted information under use of the first cryptographic key, creating therefrom encrypted information in the first persistent memory, and setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system.Type: GrantFiled: November 5, 2002Date of Patent: June 2, 2009Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Patent number: 7506175Abstract: A technique for language verification of a Java® card CAP file is provided. The Java® card CAP file is converted from an original Java® code file while conserving its original Java® semantics. The Java® card CAP file is converted into a corresponding converted Java® code file that is semantically identical to the Java® card CAP file. In a language-verification step, the converted Java® code file is then verified if it has been found to comply with a predetermined language specification.Type: GrantFiled: November 5, 2001Date of Patent: March 17, 2009Assignee: International Business Machines CorporationInventors: Michael Baentsch, Thomas Eirich, Peter Buhler, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Publication number: 20080226076Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: ApplicationFiled: May 22, 2008Publication date: September 18, 2008Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas D. Weigold
-
Publication number: 20080222427Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information.Type: ApplicationFiled: May 2, 2008Publication date: September 11, 2008Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Publication number: 20060168657Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: ApplicationFiled: October 24, 2003Publication date: July 27, 2006Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas Weigold
-
Publication number: 20060090081Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information.Type: ApplicationFiled: November 5, 2002Publication date: April 27, 2006Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas Weigold
-
Patent number: 6889303Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.Type: GrantFiled: March 9, 2001Date of Patent: May 3, 2005Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Eirich Thomas, Frank Hoering, Marcus Oestreicher
-
Patent number: 6792612Abstract: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.Type: GrantFiled: September 21, 2000Date of Patent: September 14, 2004Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Marcus Oestreicher
-
Patent number: 6772171Abstract: A method for creating an object in a non-persistent memory is proposed. From an instruction code sequence, a first instruction code is read out which effects the execution of a first function which effects the choice of a non-persistent memory as the location for the next object to be created. This object creation is effected by the execution of a second function which is effected by reading out a second instruction code. Furthermore it is proposed to store a pointer to a transient object in the stack memory and to provide a mechanism for writing this pointer to and reading it from a persistent memory.Type: GrantFiled: April 29, 1999Date of Patent: August 3, 2004Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher
-
Patent number: 6694370Abstract: A computerized method and a system for implementing in a network distributed applications, comprising instructions for a computer process which are executable on different locations in the network, is proposed. The instructions include an assert-command and/or a release-command.Type: GrantFiled: August 18, 2000Date of Patent: February 17, 2004Assignee: International Business Machines CorporationInventors: Joerg Bischof, Stefan G. Hild, Marcus Oestreicher
-
Publication number: 20030177327Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.Type: ApplicationFiled: February 19, 2003Publication date: September 18, 2003Inventors: Michael Baentsch, Peter Buhler, Eirich Thomas, Frank Hoering, Marcus Oestreicher
-
Patent number: 6496910Abstract: A method for loading instruction codes to a first memory and linking said instruction codes is proposed, whereby at least one instruction code has as parameter an address which during a loading step is not determined. This address-parametered instruction code has assigned thereto an address place. A relocation information is loaded which during a linking step effects that the address becomes determined using a starting address and a relative address offset. The then determined address is put at the address place. During the loading step, directly after loading each address-parametered instruction code with its address place, the relocation information is loaded and the address is determined in the linking step.Type: GrantFiled: June 4, 1999Date of Patent: December 17, 2002Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher
-
Publication number: 20020093856Abstract: A technique for language verification of a Java card CAP file is provided. The Java card CAP file is converted from an original Java code file while conserving its original Java semantics. The Java card CAP file is converted into a corresponding converted Java code file that is semantically identical to the Java card CAP file. In a language-verification step, the converted Java code file is then verified if it has been found to comply with a predetermined language specification.Type: ApplicationFiled: November 5, 2001Publication date: July 18, 2002Applicant: International Business Machines CorporationInventors: Michael Baentsch, Thomas Eirich, Peter Buhler, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Publication number: 20020059475Abstract: A Java run-time system comprises a stacked-based interpreter for executing a Java program which comprises Java bytecode instructions and Java class structures, a converter for mapping standard Java symbolic linking strings contained in a downloaded Java program onto linking identifiers, and an export table for storing linking identifiers generated by the converter to bind a reference in a bytecode instruction to be executed to a corresponding link target. This Java run-time system is particularly suitable for embedded microcontrollers on smart cards.Type: ApplicationFiled: November 15, 2001Publication date: May 16, 2002Applicant: International Business Machines CorporationInventors: Michael Baentsch, Thomas Eirich, Peter Buhler, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Patent number: 6339820Abstract: A space-efficient and flexible mechanism for implementing a virtual machine in a resource-constrained environment such as a smartcard is proposed. The virtual machine is designed for interpreting or carrying out instructions which are identified by an instruction code, also called opcode. Both, the addresses, respectively identifiers, of the functions implementing the instruction codes, respectively opcodes, which the virtual machine interprets, as well as parameters to those functions are kept within lookup tables.Type: GrantFiled: April 29, 1999Date of Patent: January 15, 2002Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher